diff --git a/2021/37xxx/CVE-2021-37384.json b/2021/37xxx/CVE-2021-37384.json index 2310f2a57ae..911b75b2182 100644 --- a/2021/37xxx/CVE-2021-37384.json +++ b/2021/37xxx/CVE-2021-37384.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2021-37384", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2021-37384", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A remote command execution (RCE) vulnerability in the web interface component of Furukawa 423-41W/AC before v1.1.4 and LD421-21W before v1.3.3 allows unauthenticated attackers to send arbitrary commands to the device via unspecified vectors." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://cwe.mitre.org/data/definitions/94.html", + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/94.html" + }, + { + "url": "https://owasp.org/www-community/attacks/Code_Injection", + "refsource": "MISC", + "name": "https://owasp.org/www-community/attacks/Code_Injection" + }, + { + "refsource": "MISC", + "name": "https://gist.githubusercontent.com/LuigiPolidorio/9fe61cf2edee63152161ffc52c39f6cd/raw/529cf49103e0fdf4eeb970fa1f62fa508ebe7c3c/reference.txt", + "url": "https://gist.githubusercontent.com/LuigiPolidorio/9fe61cf2edee63152161ffc52c39f6cd/raw/529cf49103e0fdf4eeb970fa1f62fa508ebe7c3c/reference.txt" } ] } diff --git a/2023/24xxx/CVE-2023-24019.json b/2023/24xxx/CVE-2023-24019.json index a570731df40..f07b9b1c3ac 100644 --- a/2023/24xxx/CVE-2023-24019.json +++ b/2023/24xxx/CVE-2023-24019.json @@ -71,16 +71,16 @@ "cvss": [ { "version": "3.1", - "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "HIGH", "privilegesRequired": "NONE", - "userInteraction": "REQUIRED", + "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 7.5, + "baseScore": 8.1, "baseSeverity": "HIGH" } ] diff --git a/2023/27xxx/CVE-2023-27390.json b/2023/27xxx/CVE-2023-27390.json index 7b331df4e6a..cfe343bf731 100644 --- a/2023/27xxx/CVE-2023-27390.json +++ b/2023/27xxx/CVE-2023-27390.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger this vulnerability." + "value": "A heap-based buffer overflow vulnerability exists in the Sequence::DrawText functionality of Diagon v1.0.139. A specially crafted markdown file can lead to arbitrary code execution. A victim would need to open a malicious file to trigger this vulnerability." } ] }, @@ -58,11 +58,6 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744", "refsource": "MISC", "name": "https://talosintelligence.com/vulnerability_reports/TALOS-2023-1744" - }, - { - "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744", - "refsource": "MISC", - "name": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1744" } ] }, @@ -76,16 +71,16 @@ "cvss": [ { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "attackVector": "LOCAL", "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", - "baseScore": 8.4, + "baseScore": 7.8, "baseSeverity": "HIGH" } ] diff --git a/2023/31xxx/CVE-2023-31194.json b/2023/31xxx/CVE-2023-31194.json index 41057897209..b4a90fdb001 100644 --- a/2023/31xxx/CVE-2023-31194.json +++ b/2023/31xxx/CVE-2023-31194.json @@ -11,7 +11,7 @@ "description_data": [ { "lang": "eng", - "value": "An access violation vulnerability exists in the GraphPlanar::Write functionality of Diagon v1.0.139. A specially crafted network request can lead to a heap buffer overflow. An attacker can send a network request to trigger this vulnerability." + "value": "An improper array index validation vulnerability exists in the GraphPlanar::Write functionality of Diagon v1.0.139. A specially crafted markdown file can lead to memory corruption. A victim would need to open a malicious file to trigger this vulnerability." } ] }, @@ -21,8 +21,8 @@ "description": [ { "lang": "eng", - "value": "CWE-122: Heap-based Buffer Overflow", - "cweId": "CWE-122" + "value": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", + "cweId": "CWE-119" } ] } @@ -71,16 +71,16 @@ "cvss": [ { "version": "3.1", - "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L", + "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "attackVector": "LOCAL", - "attackComplexity": "HIGH", + "attackComplexity": "LOW", "privilegesRequired": "NONE", - "userInteraction": "NONE", + "userInteraction": "REQUIRED", "scope": "UNCHANGED", - "confidentialityImpact": "NONE", + "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "LOW", - "baseScore": 4, + "baseScore": 5.3, "baseSeverity": "MEDIUM" } ] diff --git a/2023/37xxx/CVE-2023-37265.json b/2023/37xxx/CVE-2023-37265.json index 50522030bd4..64134d9b18d 100644 --- a/2023/37xxx/CVE-2023-37265.json +++ b/2023/37xxx/CVE-2023-37265.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-37265", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CasaOS is an open-source Personal Cloud system. Due to a lack of IP address verification an unauthenticated attackers can execute arbitrary commands as `root` on CasaOS instances. The problem was addressed by improving the detection of client IP addresses in `391dd7f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly. " + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-306: Missing Authentication for Critical Function", + "cweId": "CWE-306" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IceWhaleTech", + "product": { + "product_data": [ + { + "product_name": "CasaOS-Gateway", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6g", + "refsource": "MISC", + "name": "https://github.com/IceWhaleTech/CasaOS-Gateway/security/advisories/GHSA-vjh7-5r6x-xh6g" + }, + { + "url": "https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7", + "refsource": "MISC", + "name": "https://github.com/IceWhaleTech/CasaOS-Gateway/commit/391dd7f0f239020c46bf057cfa25f82031fc15f7" + } + ] + }, + "source": { + "advisory": "GHSA-vjh7-5r6x-xh6g", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/37xxx/CVE-2023-37266.json b/2023/37xxx/CVE-2023-37266.json index 0616e64e51e..b8525db8ed3 100644 --- a/2023/37xxx/CVE-2023-37266.json +++ b/2023/37xxx/CVE-2023-37266.json @@ -1,17 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-37266", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "security-advisories@github.com", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "CasaOS is an open-source Personal Cloud system. Unauthenticated attackers can craft arbitrary JWTs and access features that usually require authentication and execute arbitrary commands as `root` on CasaOS instances. This problem was addressed by improving the validation of JWTs in commit `705bf1f`. This patch is part of CasaOS 0.4.4. Users should upgrade to CasaOS 0.4.4. If they can't, they should temporarily restrict access to CasaOS to untrusted users, for instance by not exposing it publicly." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287: Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "IceWhaleTech", + "product": { + "product_data": [ + { + "product_name": "CasaOS", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "< 0.4.4" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/IceWhaleTech/CasaOS/security/advisories/GHSA-m5q5-8mfw-p2hr", + "refsource": "MISC", + "name": "https://github.com/IceWhaleTech/CasaOS/security/advisories/GHSA-m5q5-8mfw-p2hr" + }, + { + "url": "https://github.com/IceWhaleTech/CasaOS/commit/705bf1facbffd2ca40b159b0303132b6fdf657ad", + "refsource": "MISC", + "name": "https://github.com/IceWhaleTech/CasaOS/commit/705bf1facbffd2ca40b159b0303132b6fdf657ad" + } + ] + }, + "source": { + "advisory": "GHSA-m5q5-8mfw-p2hr", + "discovery": "UNKNOWN" + }, + "impact": { + "cvss": [ + { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.8, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "NONE", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" } ] } diff --git a/2023/38xxx/CVE-2023-38403.json b/2023/38xxx/CVE-2023-38403.json new file mode 100644 index 00000000000..b2c1b46faa2 --- /dev/null +++ b/2023/38xxx/CVE-2023-38403.json @@ -0,0 +1,82 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-38403", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "iperf3 before 3.14 allows peers to cause an integer overflow and heap corruption via a crafted length field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc", + "refsource": "MISC", + "name": "https://downloads.es.net/pub/iperf/esnet-secadv-2023-0001.txt.asc" + }, + { + "url": "https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9", + "refsource": "MISC", + "name": "https://github.com/esnet/iperf/commit/0ef151550d96cc4460f98832df84b4a1e87c65e9" + }, + { + "url": "https://bugs.debian.org/1040830", + "refsource": "MISC", + "name": "https://bugs.debian.org/1040830" + }, + { + "url": "https://github.com/esnet/iperf/issues/1542", + "refsource": "MISC", + "name": "https://github.com/esnet/iperf/issues/1542" + }, + { + "url": "https://cwe.mitre.org/data/definitions/130.html", + "refsource": "MISC", + "name": "https://cwe.mitre.org/data/definitions/130.html" + } + ] + } +} \ No newline at end of file diff --git a/2023/38xxx/CVE-2023-38404.json b/2023/38xxx/CVE-2023-38404.json new file mode 100644 index 00000000000..5aee2c7062a --- /dev/null +++ b/2023/38xxx/CVE-2023-38404.json @@ -0,0 +1,76 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-38404", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The XPRTLD web application in Veritas InfoScale Operations Manager (VIOM) before 8.0.0.410 allows an authenticated attacker to upload all types of files to the server. An authenticated attacker can then execute the malicious file to perform command execution on the remote server." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.veritas.com/content/support/en_US/security/VTS23-009", + "refsource": "MISC", + "name": "https://www.veritas.com/content/support/en_US/security/VTS23-009" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "HIGH", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.1/AC:L/AV:N/A:H/C:H/I:H/PR:H/S:U/UI:N", + "version": "3.1" + } + } +} \ No newline at end of file diff --git a/2023/38xxx/CVE-2023-38405.json b/2023/38xxx/CVE-2023-38405.json new file mode 100644 index 00000000000..ca708ab5bec --- /dev/null +++ b/2023/38xxx/CVE-2023-38405.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2023-38405", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "On Crestron 3-Series Control Systems before 1.8001.0187, crafting and sending a specific BACnet packet can cause a crash." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.crestron.com/release_notes/cp3n_1.8001.0187_release_notes.pdf", + "refsource": "MISC", + "name": "https://www.crestron.com/release_notes/cp3n_1.8001.0187_release_notes.pdf" + } + ] + } +} \ No newline at end of file diff --git a/2023/38xxx/CVE-2023-38406.json b/2023/38xxx/CVE-2023-38406.json new file mode 100644 index 00000000000..8feb2d8dee2 --- /dev/null +++ b/2023/38xxx/CVE-2023-38406.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38406", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/38xxx/CVE-2023-38407.json b/2023/38xxx/CVE-2023-38407.json new file mode 100644 index 00000000000..1b56b8a4553 --- /dev/null +++ b/2023/38xxx/CVE-2023-38407.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-38407", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2023/3xxx/CVE-2023-3723.json b/2023/3xxx/CVE-2023-3723.json new file mode 100644 index 00000000000..9a99b1262e5 --- /dev/null +++ b/2023/3xxx/CVE-2023-3723.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-3723", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file